diff --git a/rules/proxy/proxy_ua_susp_base64.yml b/rules/proxy/proxy_ua_susp_base64.yml new file mode 100644 index 000000000..2ea52fe86 --- /dev/null +++ b/rules/proxy/proxy_ua_susp_base64.yml @@ -0,0 +1,26 @@ +title: Suspicious User Agent +id: 894a8613-cf12-48b3-8e57-9085f54aa0c3 +status: experimental +description: Detects suspicious User Agent strings that end with an equal sign, which can be a sign of base64 encoded values used as User Agent string +author: Florian Roth +date: 2022/07/08 +references: + - https://blogs.jpcert.or.jp/en/2022/07/yamabot.html +logsource: + category: proxy +detection: + selection: + c-useragent|endswith: + - '=' + - 'TW96aWxsY' # base64 encoded Mozilla/ as used by YamaBot + condition: selection +fields: + - ClientIP + - c-uri + - c-useragent +falsepositives: + - Unknown +level: high +tags: + - attack.command_and_control + - attack.t1071.001 diff --git a/tools/config/splunk-windows.yml b/tools/config/splunk-windows.yml index 0a8689694..607faed0a 100644 --- a/tools/config/splunk-windows.yml +++ b/tools/config/splunk-windows.yml @@ -136,6 +136,11 @@ logsources: product: windows service: bits-client conditions: - source: 'WinEventLog:Microsoft-Windows-Bits-Client/Operational' + source: 'WinEventLog:Microsoft-Windows-Bits-Client/Operational' + windows-defender: + product: windows + service: windefend + conditions: + source: 'WinEventLog:Microsoft-Windows-Windows Defender/Operational' fieldmappings: EventID: EventCode